Deb Radcliff

Most Recent Articles by Deb Radcliff

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.

Delayed reaction

Delayed reaction

Despite the ubiquity of the Trusted Platform Module, holdups exist and adoption remains slow. Among them are issues with interoperability, considering Apple, Google and Microsoft all use different standards.

Waking the sleeping giant: Critical infrastructure

Waking the sleeping giant: Critical infrastructure

For the last several years, security experts have been stressing the vulnerability of industrial control systems. Now, with attacks like Stuxnet proof of the risk, the big question is: How will industry respond?

Cyber cold war: Espionage and warfare

Cyber cold war: Espionage and warfare

When the history of the cyber arms race is written, the first chapter surely will be devoted to Stuxnet. But now that these sophisticated strikes have started, there are plenty of questions to answer.

Advancing firewalls

Advancing firewalls

Firewalls have been an enterprise security mainstay for years. But with a majority of attacks now being launched against the web application layer of the stack, the technology must evolve.

More Articles by Deb Radcliff

Sign up to our newsletters

POLL